Transcription

2 Expert-led training with real-world application from a global leader in industrial cybersecurity Given the increasing reliance on open standards and interconnectivity in industrial networks and control systems, the risks of cyberattack are growing and present serious threats to economic and national security. Large-scale cyberwarfare through acts of espionage, sabotage, and terrorism could dismantle a nations power grids, transportation and telecommunications systems, financial networks, manufacturing, and government functions. As a widely recognized, world leader in cybersecurity standards development and training, the International Society of Automation (ISA) provides the proven expertise and know-how to help safeguard industrial automation and control systems. As an example, the US government is looking to integrate ISA s industrial automation and control systems standards (ANSI/ISA-62443) as part of its national cybersecurity initiative. ISA s world-renowned cybersecurity experts provide the comprehensive, practical instruction needed to immediately apply your knowledge in the workplace, and through a wide variety of learning formats: One-day classroom courses Multi-day classroom courses Multi-week, online, instructor-assisted courses Live webinars Pre-recorded webinars In addition, to ensure flexibility and to meet varying customer needs, ISA offers cybersecurity training at a variety of locations: at ISA headquarters in North Carolina, at ISA s many regional training centers, and onsite directly at customer facilities. Who is ISA? Founded in 1945, ISA is a global organization that serves automation and control professionals through standards development, certification, education, training, publishing, and technical conferences and events. To learn more about ISA, visit ISA Training: World-class subject-matter expertise ISA s courses are known and respected worldwide for their unbiased, practical approach to technology application. For more than 65 years, ISA has built on its proven track record of identifying the real-world training needs of organizations and automation and control professionals, and working with leading content experts to deliver rapid, customized solutions. Taking an ISA training course will: Enhance on-the-job training Fill in missing knowledge gaps Teach you the Hows and Whys Provide continuing education credits Expand your professional network Table of Contents ISA99/IEC Cybersecurity Certificate Programs 3 Using the ANSI/ISA Standards to Secure Your Control System (IC32) 4 Cybersecurity for Automation, Control, and SCADA Systems (IC32E) 5 Assessing the Cybersecurity of New or Existing IACS Systems (IC33) NEW! 6 IACS Cybersecurity Design & Implementation (IC34) NEW! 7 IACS Cybersecurity Operations & Maintenance (IC37) NEW! 8 Industrial Networking and Security (TS12) 9 Advanced Industrial Networking and Cyber Security (TS20) NEW! 10 Control Systems Security and ANSI/ISA Webinar Series 11

3 ISA99/IEC Cybersecurity Fundamentals Specialist Certificate Program ISA has developed a knowledge-based certificate recognition program designed for professionals involved in IT and control system security roles that need to develop a command of industrial cybersecurity terminology and an understanding of the material embedded in the ISA99/IEC standards: PROGRAM REQUIREMENTS ISA99/IEC Cybersecurity Fundamentals Specialist designations and certificates will be awarded to individuals who meet the following program requirements: Successfully complete an intensive two-day, classroom training course from ISA: Using the ANSI/ISA Standards to Secure Your Industrial Control System (IC32) course information listed on the next page. Earn a passing score on the 75-question multiple-choice exam. PROGRAM PRE-REQUISITES There are no required prerequisites for this program; however, it is highly recommended that applicants have: Three to five years of experience in the IT cybersecurity field with some experience in an industrial setting with at least two years specifically in a process control engineering setting Some level of knowledge or exposure to the ANSI/ISA standards RENEWAL Because these are certificates and not certifications, they do not have to be renewed ; however, a certificate will only be considered current for three years. In order to extend the current status of a certificate, you will be required to score 70% or above on a 20-question ISA999/IEC Certificate Knowledge Review Exam. COMING SOON! In addition to ISA s Fundamentals Specialist certificate above, watch for information on subsequent courses and related exams in our cyber security suite of certificate programming. Knowledge/skills topic areas covered will include: Certificate 2: Risk Assessment Certificate 3: Design Certificate 4: Maintenance Learn more about this certificate program, eligibility criteria, renewal, and upcoming courses at 3

4 Using the ANSI/ISA Standards to Secure Your Control System The move to using open standards such as Ethernet, TCP/IP, and web technologies in supervisory control and data acquisition (SCADA) and process control networks has begun to expose these systems to the same cyberattacks that have wreaked so much havoc on corporate information systems. This course provides a detailed look at how the ANSI/ISA standards can be used to protect your critical control systems. It also explores the procedural and technical differences between the security for traditional IT environments and those solutions appropriate for SCADA or plant floor environments. Discuss the principles behind creating an effective long-term security program Interpret the ANSI/ISA industrial security guidelines and apply them to your operation Explain the concepts of defense-in-depth, zone, and conduit models of security Analyze the trends in industrial system security incidents and methods hackers use to attack Define the principles behind the key risk mitigation techniques, including anti-virus and patch management, firewalls, and virtual private networks And more YOU WILL COVER: How Cyberattacks Happen Creating A Security Program Risk Analysis Addressing Risk Monitoring and Improving the CSMS And more CLASSROOM/LABORATORY EXERCISES: Develop a business case for industrial security Conduct security threat analysis Investigate scanning and protocol analysis tools Apply basic security analysis tools software Required for ISA99/IEC Cybersecurity Fundamentals Specialist Certificate Program (See page 3.) Course No.: IC32 Length: 2 Days CEUs: 1.4 Price: $1,265 ISA Member/Group Rate $1,425 Affiliate Member $1,585 Community Member/List $1,265 Multi-Registration Rate Includes ISA Standards and Technical Reports: ANSI/ISA ( )-2007: Security for Industrial Automation and Control Systems Part 1-1: Terminology, Concepts, and Models (A $155 Value!) ANSI/ISA ( )-2009: Security for Industrial Automation and Control Systems Part 2-1: Establishing an Industrial Automation and Control Systems Security Program (A $215 Value!) ANSI/ISA ( )-2013: Security for Industrial Automation and Control Systems Part 3-3: System Security Requirements and Security Levels (A $260 Value!) Recommended Resource: ISA Text: Industrial Network Security by David J. Teumin 2015 SCHEDULE Research Triangle Park, NC August Cerritos, CA 1 2 April Part of ISA s Technical Training Camp Denver, CO March Houston, TX June; 1 2 October Philadelphia, PA 30 August 1 September Atlanta, GA 7 8 December 4

5 Cybersecurity for Automation, Control, and SCADA Systems (Online) The move to using open standards such as Ethernet, TCP/IP, and web technologies in supervisory control and data acquisition (SCADA) systems and process control networks has begun to expose these systems to the same cyberattacks that have wreaked so much havoc on corporate information systems. This course provides a detailed look at how the ANSI/ISA standards can be used to protect your critical control systems. You will also explore the procedural and technical differences between the security for traditional IT environments and those solutions appropriate for SCADA or plant floor environments. Identify the principles behind creating an effective long-term security program Interpret the ANSI/ISA industrial security guidelines and apply them to your operation Learn the basics of risk and vulnerability analysis methodologies Explain the principles of security policy development Define the concepts of defense-in-depth, zone, and conduit models of security Analyze the trends in industrial system security incidents and methods hackers use to attack Identify the principles behind the key risk mitigation techniques, including anti-virus and patch management, firewalls, and virtual private networks YOU WILL COVER: Week 1/Module 1: Defining Industrial Cybersecurity Week 2/Module 2: Risk Assessment Week 3/Module 3: Threats and Vulnerabilities Week 4/Module 4: Security Policies, Programs, and Procedures Week 5/Module 5: Understanding TCP/IP, Hackers, and Malware Week 6/Module 6: Technical Countermeasures Week 7/Module 7: Architectural and Operational Strategies Week 8: Final Course Examination COURSE MATERIALS: Course Noteset and Syllabus ISA Standards and Technical Reports: ANSI/ISA ( )-2007: Security for Industrial Automation and Control Systems Part 1-1: Terminology, Concepts, and Models (A $155 Value!) ANSI/ISA ( )-2009: Security for Industrial Automation and Control Systems Part 2-1: Establishing an Industrial Automation and Control Systems Security Program (A $215 Value!) ANSI/ISA ( )-2013: Security for Industrial Automation and Control Systems Part 3-3: System Security Requirements and Security Levels (A $260 Value!) Recommended Resource: ISA Text: Industrial Network Security by David J. Teumin Course No.: IC32E Length: 8 Weeks CEUs: 1.4 Price: $1,265 ISA Member/Group Rate $1,425 Affiliate Member $1,585 Community Member/List $1,265 Multi-Registration Rate Required for ISA99/IEC Cybersecurity Fundamentals Specialist Certificate Program (See page 3.) 2015 SCHEDULE Online...6 April 29 May; 20 July 11 September; 21 September 13 November 5

6 Assessing the Cybersecurity of New or Existing IACS Systems Part of the ISA s Cybersecurity Certificate Program The first phase in the IACS Cybersecurity Lifecycle (defined in ISA ) is to identify and document IACS assets and perform a cybersecurity vulnerability and risk assessment in order to identify and understand the high-risk vulnerabilities that require mitigation. Per ISA these assessments need to be performed on both new (i.e. greenfield) and existing (i.e. brownfield) applications. Part of the assessment process involves developing a zone and conduit model of the system, identifying security level targets, and documenting the cybersecurity requirements into a cybersecurity requirements specification (CRS). This course will provide students with the information and skills to assess the cybersecurity of a new or existing IACS and to develop a cybersecurity requirements specification that can be used to document the cybersecurity requirements the project. Identify and document the scope of the IACS under assessment Specify, gather or generate the cybersecurity information required to perform the assessment Identify or discover cybersecurity vulnerabilities inherent in the IACS products or system design Interpret the results of a process hazard analysis (PHA) Organize and facilitate a cybersecurity risk assessment for an IACS Identify and evaluate realistic threat scenarios Identify and assess the effectiveness of existing countermeasures Identify gaps in existing policies, procedures and standards Evaluate the cost, complexity and effectiveness of new countermeasures in order to make meaningful recommendations Establish and document security zones and conduits Develop a cybersecurity requirements specification (CRS) CLASSROOM/LABORATORY EXERCISES: Performing an IACS asset criticality assessment Critiquing system architecture diagrams Developing a data flow diagrams Researching IACS vulnerabilities Using vulnerability scanning tools Cybersecurity Risk Assessment Exercise Creating a zone & conduit diagram Critiquing a cybersecurity requirements specification Developing a cybersecurity test specification WHO SHOULD ATTEND: Control systems engineers and managers System Integrators IT engineers and managers industrial facilities IT corporate/security professionals Plant Safety and Risk Management RECOMMENDED PRE-REQUISITE: ISA Course IC32 or equivalent knowledge/ experience. Course No.: IC33 Length: 3 days CEUs: 2.1 Price: $1,485 ISA Member/Group Rate $1,770 Affiliate Member $1,855 Community Member/List $1,485 Multi-Registration Rate 2015 SCHEDULE Coming Soon! No dates are currently scheduled for this course offering. 6

7 IACS Cybersecurity Design & Implementation Part of the ISA s Cybersecurity Certificate Program The second phase in the IACS Cybersecurity Lifecycle (defined in ISA ) focuses on the activities associated with the design and implementation of IACS cybersecurity countermeasures. This involves the selection of appropriate countermeasures based upon their security level capability and the nature of the threats and vulnerabilities identified in the Assess phase. This phase also includes cybersecurity acceptance testing of the integrated solution, in order to validate countermeasures are properly implemented and that the IACS has achieved the target security level. This course will provide students with the information and skills to select and implement cybersecurity countermeasures for a new or existing IACS in order to achieve the target security level assigned to each IACS zone or conduit. Additionally, students will learn how to develop and execute test plans to verify that the cybersecurity of an IACS solution has properly satisfied the objectives in the cybersecurity requirements specification. Interpret the results of an ICS cybersecurity risk assessment Interpret a cybersecurity requirements specification (CRS) Develop a conceptual design based upon information in a well-crafted CRS Explain the security development lifecycle process and deliverables Perform a basic firewall configuration and commissioning Design a secure remote access solution Develop system hardening design specification Implement a basic network intrusion detection system Develop a Cybersecurity Acceptance test plan (CFAT/CSAT) Perform a basic CFAT or CSAT YOU WILL COVER: Introduction to the ICS Cybersecurity Lifecycle Assessment phase Implementation phase Maintenance phase Conceptual Design Process Interpreting risk assessment results Cybersecurity requirements specifications Developing a conceptual design Conceptual design specification Detailed Design Process Security Development Lifecycle (SDL) Types of technology Selecting appropriate technology Developing a detailed design Documenting the design/specification Design & Implementation Examples Firewall design example Remote access design example System hardening design example Intrusion detection design example Testing Developing test plans Cybersecurity Factory Acceptance Testing Cybersecurity Site Acceptance Testing CLASSROOM/LABORATORY EXERCISES: Firewall configuration & commissioning Remote access Intrusion detection System Hardening WHO SHOULD ATTEND: Control systems engineers and managers System Integrators IT engineers and managers industrial facilities Plant managers Plant Safety and Risk Management RECOMMENDED PRE-REQUISITE: ISA Courses IC32 and IC33 or equivalent knowledge/experience. Course No.: IC34 Length: 3 days CEUs: 2.1 Price: $1,485 ISA Member/Group Rate $1,770 Affiliate Member $1,855 Community Member/List $1,485 Multi-Registration Rate 2015 SCHEDULE Coming Soon! No dates are currently scheduled for this course offering. 7

8 IACS Cybersecurity Operations & Maintenance Part of the ISA s Cybersecurity Certificate Program The third phase in the IACS Cybersecurity Lifecycle (defined in ISA ) focuses on the activities associated with the ongoing operations and maintenance of IACS cybersecurity. This involves network diagnostics and troubleshooting, security monitoring and incident response, and maintenance of cybersecurity countermeasures implemented in the Design & Implementation phase. This phase also includes security management of change, backup and recovery procedures and periodic cybersecurity audits. This course will provide students with the information and skills to detect and troubleshoot potential cybersecurity events as well as the skills to maintain the security level of an operating system throughout its lifecycle despite the challenges of an every changing threat environment. Perform basic network diagnostics and troubleshooting Interpret the results of IACS device diagnostic alarms and event logs Develop and follow IACS backup and restoration procedure Understand the IACS patch management lifecycle Develop and follow an IACS patch management procedure Develop and follow an antivirus management procedure Define the basics of application control and whitelisting tools Define the basics of network and host intrusion detection Define the basics of security incident and event monitoring tools Develop and follow an incident response plan Develop and follow an IACS management of change procedure Conduct a basic IACS cybersecurity audit YOU WILL COVER: Introduction to the ICS Cybersecurity Lifecycle Network Diagnostics and Troubleshooting Application Diagnostics and Troubleshooting IACS Cybersecurity Operating Procedures & Tools IACS incident response CLASSROOM/LABORATORY EXERCISES: Network diagnostics and troubleshooting Intrusion detection alarm Event monitoring Configuration management Patch management Anti-virus management Whitelisting Vulnerability scanning tools Incident response Backup and recovery WHO SHOULD ATTEND: Operations and maintenance personnel Control systems engineers and managers System Integrators IT engineers and managers industrial facilities Plant Safety and Risk Management RECOMMENDED PRE-REQUISITE: ISA Courses TS06, TS12, TS20, IC32, IC33 and IC34 or equivalent knowledge/experience. Course No.: IC37 Length: 3 days CEUs: 2.1 Price: $1,485 ISA Member/Group Rate $1,770 Affiliate Member $1,855 Community Member/List $1,485 Multi-Registration Rate 2015 SCHEDULE Coming Soon! No dates are currently scheduled for this course offering. 8

9 Industrial Networking and Security You will learn about the latest developments in networking, including practical tips on designing, implementing, and testing TCP/IP-based networks and how to apply them securely and reliably in an industrial environment. You will discuss the functions and purposes of the elements used to create and protect an industrial network, including switches, routers, firewalls, and intrusion detection/prevention systems. This course will expand your practical knowledge of LAN, WAN, and Web technologies. This course illustrates what is safe and practical for today s plant floor, including Internet technologies such as web servers, TCP/IP, and fiber optics. Special focus will be placed on the questions of security in the industrial setting drawing on the work of the ISA99 standards committee and the National Institute of Standards and Technology (NIST). Identify standards for analog dial-up connections and modems Apply TCP/IP protocols, addressing, and troubleshooting Estimate where web technologies can safely be used for process control Identify security technologies such as firewalls, proxy servers, virus scanning, and intrusion protection Perform basic security scanning on your networks and perform hardening of your computers And more... YOU WILL COVER: TCP/IP Networking Secure Architectures Packets and Protocols Building a Plant Floor Web Server Network Security Issues And more... CLASSROOM/LABORATORY EXERCISES: Use TCP/IP diagnostic tools in Windows-2000/XP Use network analyzers to troubleshoot Configure a security firewall for the plant floor Perform a basic security scan on a target system And more... Course No.: TS12 Length: 5 days CEUs: 3.5 Price: $2,720 ISA Member/Group Rate $3,060 Affiliate Member $3,400 Community Member/List $2,720 Multi-Registration Rate 2015 SCHEDULE Research Triangle Park, NC August Cerritos, CA June 9

10 Advanced Industrial Networking and Cyber Security NEW! In this course you will learn about the latest developments in Industrial Control System (ICS) networking and cybersecurity. The course provides a review of networking and cybersecurity technology and expands your understanding of industrial network concepts by reviewing networking principals including TCP/UDP, IPv4/IPv6, ICS protocols, addressing and troubleshooting. You will explore network security architectures and learn how to use layering and segmentation to improve security, as well as how web technology works and how web server capability is used in industry and the security problems engendered by such use. Pre-requisite: This is an advanced course with a minimum satisfactory completion of TS06 (or equivalent in experience/training) is recommended for successful completion. Expand your understanding of industrial network concepts Review networking principles Apply the TCP/UCP & IPv4/IPv6 protocols, addressing, and troubleshooting Review how web technology works and how web server capability is used in industry and the security problems engendered by such use Place web technologies where they can be used securely for process control Develop network security architectures and learn how to use layering and segmentation to improve security, and more! YOU WILL COVER: The ISO-OSI Reference Model IPv4 & IPv6 Structure Converting from IPv4 to IPv6 Without Causing Security Problems Making Networks Secure Commercial Off The Shelf Operating Systems Security/Performance Problems Associated with Patch/Virus Update Management And more! CLASSROOM/LABORATORY EXERCISES: Assessing a Local Area Network (LAN) Using Windows and Linux CLI Commands Windows Networking Using Basic Scanner Tools Establishing a VPN Hacker Tools Hardening Using HTML Development Tools Capture TCP HTTP Session Course No.: TS20 Length: 4.5 days CEUs: 3.2 Price: $2,720 ISA Member/Group Rate $3,060 Affiliate Member $3,400 Community Member/List $2,720 Multi-Registration Rate Includes ISA Standard: ANSI/ISA (ANSI/ISA ): Security for Industrial Automation and Control Systems: Establishing an Industrial Automation and Control Systems Security Program 2015 SCHEDULE Research Triangle Park, NC March; 30 November 4 December Houston, TX July October Cerritos, CA May 10

11 Control Systems Security and ANSI/ISA Webinar Series Improve your ANSI/ISA knowledge with these 90-minute, live webinars! Save up to 25% when you register for all three webinars in this series at one time! To take advantage of the series pricing, you must call ISA Customer Service at to register as this offer is not available online. Cybersecurity Risk Assessment for Automation Systems Course No.: IC32CW1 Dates: 18 March and 10 June Risk analysis is an important step in creating a cybersecurity plan for your automation system. Risk analysis not only identifies security vulnerabilities but also provides the business case for the countermeasures that reduce risk. This webinar introduces control engineers to the concepts of risk analysis and how they are applied to industrial manufacturing and control systems based on the ANSI/ ISA standards. This webinar is also valuable for IT professionals who wish to learn the special considerations for performing risk analysis on automation systems. Using Firewalls and Security Zones on the Plant Floor Course No.: IC32CW2 Dates: 25 March and 17 June The network firewall is one of the most important tools in any cybersecurity designer s toolbox. This webinar introduces the industrial controls engineer to the world of firewall system design, focusing on how these devices can be effectively deployed on the typical plant floor to help meet the ANSI/ISA security standards. A Tour of the ANSI/ISA Security Standards Course No.: IC32CW3 Dates: 1 April and 24 June This webinar introduces you to the ANSI/ISA Security for Industrial Automation and Control Systems standards and how these are organized. You will be given a brief introduction to the terminology, concepts, and models of ANSI/ISA cybersecurity and elements of creating a cybersecurity management system. WEBINAR DETAILS (PER SEMINAR): You can provide these live quality seminars at your location for an unlimited number of participants for one low site fee: Pricing (per site): $250 ISA Member $280 Affiliate Member $310 Community Member/List $250 Multi-Registration Rate Can t attend? Missed the live events? Recorded versions of these sessions are also available, and are free for ISA members. 11

12 Bring ISA cybersecurity training right to you! All of ISA s cybersecurity training courses can be taught at your company location through ISA s Onsite Training. Contact ISA at or at for more information. ISA has been accredited as an Authorized Provider by the International Association for Continuing Education and Training (IACET). In obtaining this accreditation, ISA has demonstrated that it complies with the ANSI/ IACET Standard which is recognized internationally as a standard of good practice. As a result of their Authorized Provider status, ISA is authorized to offer IACET CEUs for its programs that qualify under the ANSI/IACET Standard. Provider # Founded in 1945, the International Society of Automation ( is a leading, global, nonprofit organization that is setting the standard for automation by helping over 30,000 worldwide Members and other professionals solve difficult technical problems, while enhancing their leadership and personal career capabilities. Based in Research Triangle Park, North Carolina, ISA develops standards, certifies industry professionals, provides education and training, publishes books and technical articles, and hosts conferences and exhibitions for automation professionals. ISA is the founding sponsor of the Automation Federation ( EP International Society of Automation 67 T.W. Alexander Drive P.O. Box Research Triangle Park, NC Get the security and data communications training you need from the ANSI/ISA experts!

Industrial Security Solutions Building More Secure Environments From Enterprise to End Devices You have assets to protect. Control systems, networks and software can all help defend against security threats

Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze

Key Data Product #: 3380 Course #: 6420A Number of Days: 5 Format: Certification Exams: Instructor-Led None This course syllabus should be used to determine whether the course is appropriate for the students,

Symphony Plus Cyber security for the power and water industries Symphony Plus Cyber Security_3BUS095402_(Oct12)US Letter.indd 1 01/10/12 10:15 Symphony Plus Cyber security for the power and water industries

10967 - Fundamentals of a Windows Server Infrastructure General Description Learn the fundamental knowledge and skills that you need to build a Windows Server infrastructure with Windows Server 2012. This

Industrial Cyber Security Complete Solutions to Protect Availability, Safety and Reliability of Industrial Facilities WE HEAR ABOUT CYBER INCIDENTS EVERY DAY IN THE NEWS, BUT JUST HOW RELEVANT ARE THESE

Remote Services Managing Open Systems with Remote Services Reduce costs and mitigate risk with secure remote services As control systems move from proprietary technology to open systems, there is greater

Anne Arundel Community College Tracks Anne Arundel Community College s computer technologies courses have been organized into 10 suggested tracks. The tracks are arranged to ensure that students have the

Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security

CIP- 005 R2: Understanding the Security Requirements for Secure Remote Access to the Bulk Energy System Purpose CIP-005-5 R2 is focused on ensuring that the security of the Bulk Energy System is not compromised

January 2013 Page 1 This paper describes the system philosophy and guidelines for keeping your DeltaV System secure from Cyber attacks. www.deltav.com January 2013 Page 2 Table of Contents Introduction...

LLNL-JRNL-653695 A Systems Approach to HVAC Contractor Security K. M. Masica April 24, 2014 A Systems Approach to HVAC Contractor Security Disclaimer This document was prepared as an account of work sponsored

Agenda Introduction to SCADA Importance of SCADA security Recommended steps SCADA systems are usually highly complex and SCADA systems are used to control complex industries Yet.SCADA systems are actually

1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.

Four Top Emagined Security Services. www.emagined.com Emagined Security offers a variety of Security Services designed to support growing security needs. This brochure highlights four key Emagined Security

State of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE NETWORK RESOURCES POLICY Effective December 15, 2008 State of Illinois Department of Central Management Services

Network Technology (10101) Rationale Statement: The goal of this course is to help students recognize the significant impact of computer networking in their lives. Virtually any career involves the use

Electronic Security Perimeter (ESP) Identification and Access Control Process 1. Introduction. A. This document outlines a multi-step process for identifying and protecting ESPs pursuant to the North American

SCADA SYSTEMS AND SECURITY WHITEPAPER Abstract: This paper discusses some of the options available to companies concerned with the threat of cyber attack on their critical infrastructure, who as part of

The rocky relationship between safety and security Best practices for avoiding common cause failure and preventing cyber security attacks in Safety Systems Abstract: An industry practice reflected in the

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,

NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus CSCI - 440 Network Security and Perimeter Protection 3-0-3 CATALOG DESCRIPTION This

+ CNE Network Assessment Overview The purpose of the network assessment is to measure, analyze, and document network functionality and performance. Areas of assessment include: Local Area Network (wired

Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100 Course Description: Introduction to Cybersecurity is designed to provide students the basic concepts and terminology